General
-
Target
351edd8cf2f5a1d958e750db10837f7f9bd7d8eefb4ae30a7b44571400db3ef4
-
Size
124KB
-
Sample
240715-n8vkrsxbnj
-
MD5
c0e559bc1ed96532c24de807f21ede23
-
SHA1
a22b5d048d4aa02d6a0a31a605abf6421d661fc4
-
SHA256
351edd8cf2f5a1d958e750db10837f7f9bd7d8eefb4ae30a7b44571400db3ef4
-
SHA512
86ed6ee0d0e1d472cbebe8a3337975fdbad300329aa166e8ef9b28bb34b8b5b23a19ebf05aa7195b804a48baa9e574dd0d362d0bea8d615d718535d8718dd610
-
SSDEEP
3072:4+ZDhLeoLD3rQ2/iMPW6JgjPq9K07qH5vq9f:jquDIIWt+q
Static task
static1
Behavioral task
behavioral1
Sample
351edd8cf2f5a1d958e750db10837f7f9bd7d8eefb4ae30a7b44571400db3ef4.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
351edd8cf2f5a1d958e750db10837f7f9bd7d8eefb4ae30a7b44571400db3ef4
-
Size
124KB
-
MD5
c0e559bc1ed96532c24de807f21ede23
-
SHA1
a22b5d048d4aa02d6a0a31a605abf6421d661fc4
-
SHA256
351edd8cf2f5a1d958e750db10837f7f9bd7d8eefb4ae30a7b44571400db3ef4
-
SHA512
86ed6ee0d0e1d472cbebe8a3337975fdbad300329aa166e8ef9b28bb34b8b5b23a19ebf05aa7195b804a48baa9e574dd0d362d0bea8d615d718535d8718dd610
-
SSDEEP
3072:4+ZDhLeoLD3rQ2/iMPW6JgjPq9K07qH5vq9f:jquDIIWt+q
-
Detects Strela Stealer payload
-